diff options
author | 2002-06-06 00:37:36 +0000 | |
---|---|---|
committer | 2002-06-06 00:37:36 +0000 | |
commit | 48fbc2e4cc6750c319871bb6dc8803f03a06fdcc (patch) | |
tree | 76c5acaf68ac51f8850dc8083c2725b8618e2afb | |
parent | zap (diff) | |
download | wireguard-openbsd-48fbc2e4cc6750c319871bb6dc8803f03a06fdcc.tar.xz wireguard-openbsd-48fbc2e4cc6750c319871bb6dc8803f03a06fdcc.zip |
-Wall -Werror sweep on i386.
-rw-r--r-- | kerberosV/src/kdc/kaserver.c | 5 | ||||
-rw-r--r-- | kerberosV/src/kdc/kerberos4.c | 4 | ||||
-rw-r--r-- | kerberosV/src/kuser/kinit.c | 2 | ||||
-rw-r--r-- | kerberosV/src/lib/kadm5/ipropd_master.c | 1 | ||||
-rw-r--r-- | kerberosV/src/lib/kadm5/ipropd_slave.c | 1 | ||||
-rw-r--r-- | kerberosV/src/lib/krb5/crypto.c | 21 | ||||
-rw-r--r-- | kerberosV/src/lib/krb5/init_creds.c | 10 | ||||
-rw-r--r-- | kerberosV/src/lib/roken/resolve.c | 1 |
8 files changed, 24 insertions, 21 deletions
diff --git a/kerberosV/src/kdc/kaserver.c b/kerberosV/src/kdc/kaserver.c index a59138b97c0..be739c2b7b0 100644 --- a/kerberosV/src/kdc/kaserver.c +++ b/kerberosV/src/kdc/kaserver.c @@ -259,11 +259,12 @@ create_reply_ticket (struct rx_header *hdr, struct rx_header reply_hdr; des_cblock zero; size_t pad; - unsigned fyrtiosjuelva; + unsigned fyrtiosjuelva; /* XXX better variable name + (this means 4711 in swedish. not kidding */ /* create the ticket */ - des_new_random_key(&session); + des_new_random_key((unsigned char *)&session); krb_create_ticket (&ticket, 0, name, instance, realm, addr->sin_addr.s_addr, diff --git a/kerberosV/src/kdc/kerberos4.c b/kerberosV/src/kdc/kerberos4.c index b3f05c68219..2da37685ab7 100644 --- a/kerberosV/src/kdc/kerberos4.c +++ b/kerberosV/src/kdc/kerberos4.c @@ -318,7 +318,7 @@ do_version4(unsigned char *buf, KTEXT r; des_cblock session; - des_new_random_key(&session); + des_new_random_key((unsigned char *)&session); krb_create_ticket(&ticket, 0, name, inst, v4_realm, addr->sin_addr.s_addr, session, life, kdc_time, @@ -493,7 +493,7 @@ do_version4(unsigned char *buf, KTEXT_ST cipher, ticket; KTEXT r; des_cblock session; - des_new_random_key(&session); + des_new_random_key((unsigned char *)&session); krb_create_ticket(&ticket, 0, ad.pname, ad.pinst, ad.prealm, addr->sin_addr.s_addr, &session, life, kdc_time, sname, sinst, skey->key.keyvalue.data); diff --git a/kerberosV/src/kuser/kinit.c b/kerberosV/src/kuser/kinit.c index aefac52560e..e286c6cfd0e 100644 --- a/kerberosV/src/kuser/kinit.c +++ b/kerberosV/src/kuser/kinit.c @@ -618,7 +618,7 @@ main (int argc, char **argv) #ifdef KRB4 if(get_v4_tgt == -1) krb5_appdefault_boolean(context, "kinit", - krb5_principal_get_realm(context, principal), + (krb5_realm)krb5_principal_get_realm(context, principal), "krb4_get_tickets", TRUE, &get_v4_tgt); #endif diff --git a/kerberosV/src/lib/kadm5/ipropd_master.c b/kerberosV/src/lib/kadm5/ipropd_master.c index 041d992a994..97a6f71e3dd 100644 --- a/kerberosV/src/lib/kadm5/ipropd_master.c +++ b/kerberosV/src/lib/kadm5/ipropd_master.c @@ -32,6 +32,7 @@ */ #include "iprop.h" +#include <util.h> RCSID("$KTH: ipropd_master.c,v 1.23 2001/08/30 15:15:50 nectar Exp $"); diff --git a/kerberosV/src/lib/kadm5/ipropd_slave.c b/kerberosV/src/lib/kadm5/ipropd_slave.c index 852d976f7f3..b4801669350 100644 --- a/kerberosV/src/lib/kadm5/ipropd_slave.c +++ b/kerberosV/src/lib/kadm5/ipropd_slave.c @@ -32,6 +32,7 @@ */ #include "iprop.h" +#include <util.h> RCSID("$KTH: ipropd_slave.c,v 1.24 2001/08/31 03:12:17 assar Exp $"); diff --git a/kerberosV/src/lib/krb5/crypto.c b/kerberosV/src/lib/krb5/crypto.c index 65b5757eddf..017142551cf 100644 --- a/kerberosV/src/lib/krb5/crypto.c +++ b/kerberosV/src/lib/krb5/crypto.c @@ -248,12 +248,12 @@ DES_AFS3_Transarc_string_to_key (krb5_data pw, memcpy(&temp_key, "kerberos", 8); des_set_odd_parity (&temp_key); des_set_key (&temp_key, schedule); - des_cbc_cksum (password, &ivec, passlen, schedule, &ivec); + des_cbc_cksum ((des_cblock *)password, &ivec, passlen, schedule, &ivec); memcpy(&temp_key, &ivec, 8); des_set_odd_parity (&temp_key); des_set_key (&temp_key, schedule); - des_cbc_cksum (password, key, passlen, schedule, &ivec); + des_cbc_cksum ((des_cblock *)password, key, passlen, schedule, &ivec); memset(&schedule, 0, sizeof(schedule)); memset(&temp_key, 0, sizeof(temp_key)); memset(&ivec, 0, sizeof(ivec)); @@ -359,8 +359,9 @@ DES3_string_to_key(krb5_context context, des_set_key(keys + i, s[i]); } memset(&ivec, 0, sizeof(ivec)); - des_ede3_cbc_encrypt(tmp, tmp, sizeof(tmp), - s[0], s[1], s[2], &ivec, DES_ENCRYPT); + des_ede3_cbc_encrypt((des_cblock *)tmp, (des_cblock *)tmp, + sizeof(tmp), s[0], s[1], s[2], &ivec, + DES_ENCRYPT); memset(s, 0, sizeof(s)); memset(&ivec, 0, sizeof(ivec)); for(i = 0; i < 3; i++){ @@ -894,8 +895,8 @@ RSA_MD4_DES_checksum(krb5_context context, MD4_Update (&md4, data, len); MD4_Final (p + 8, &md4); memset (&ivec, 0, sizeof(ivec)); - des_cbc_encrypt(p, - p, + des_cbc_encrypt((des_cblock *)p, + (des_cblock *)p, 24, key->schedule->data, &ivec, @@ -969,8 +970,8 @@ RSA_MD5_DES_checksum(krb5_context context, MD5_Update (&md5, data, len); MD5_Final (p + 8, &md5); memset (&ivec, 0, sizeof(ivec)); - des_cbc_encrypt(p, - p, + des_cbc_encrypt((des_cblock *)p, + (des_cblock *)p, 24, key->schedule->data, &ivec, @@ -1031,8 +1032,8 @@ RSA_MD5_DES3_checksum(krb5_context context, MD5_Update (&md5, data, len); MD5_Final (p + 8, &md5); memset (&ivec, 0, sizeof(ivec)); - des_ede3_cbc_encrypt(p, - p, + des_ede3_cbc_encrypt((des_cblock *)p, + (des_cblock *)p, 24, sched[0], sched[1], sched[2], &ivec, diff --git a/kerberosV/src/lib/krb5/init_creds.c b/kerberosV/src/lib/krb5/init_creds.c index f66e694f6e8..7478dd149cf 100644 --- a/kerberosV/src/lib/krb5/init_creds.c +++ b/kerberosV/src/lib/krb5/init_creds.c @@ -103,26 +103,26 @@ krb5_get_init_creds_opt_set_default_flags(krb5_context context, time_t t; b = get_config_bool (context, realm, "forwardable"); - krb5_appdefault_boolean(context, appname, realm, "forwardable", b, &b); + krb5_appdefault_boolean(context, appname, (krb5_realm)realm, "forwardable", b, &b); krb5_get_init_creds_opt_set_forwardable(opt, b); b = get_config_bool (context, realm, "proxiable"); - krb5_appdefault_boolean(context, appname, realm, "proxiable", b, &b); + krb5_appdefault_boolean(context, appname, (krb5_realm)realm, "proxiable", b, &b); krb5_get_init_creds_opt_set_proxiable (opt, b); - krb5_appdefault_time(context, appname, realm, "ticket_lifetime", 0, &t); + krb5_appdefault_time(context, appname, (krb5_realm)realm, "ticket_lifetime", 0, &t); if (t == 0) t = get_config_time (context, realm, "ticket_lifetime", 0); if(t != 0) krb5_get_init_creds_opt_set_tkt_life(opt, t); - krb5_appdefault_time(context, appname, realm, "renew_lifetime", 0, &t); + krb5_appdefault_time(context, appname, (krb5_realm)realm, "renew_lifetime", 0, &t); if (t == 0) t = get_config_time (context, realm, "renew_lifetime", 0); if(t != 0) krb5_get_init_creds_opt_set_renew_life(opt, t); - krb5_appdefault_boolean(context, appname, realm, "no-addresses", FALSE, &b); + krb5_appdefault_boolean(context, appname, (krb5_realm)realm, "no-addresses", FALSE, &b); if (b) krb5_get_init_creds_opt_set_address_list (opt, &no_addrs); diff --git a/kerberosV/src/lib/roken/resolve.c b/kerberosV/src/lib/roken/resolve.c index d2f5fd5ff99..7d93caff61b 100644 --- a/kerberosV/src/lib/roken/resolve.c +++ b/kerberosV/src/lib/roken/resolve.c @@ -481,7 +481,6 @@ dns_free_data(struct dns_reply *r) void dns_srv_order(struct dns_reply *r) { - return 0; } #endif |